• Title/Summary/Keyword: network virtualization

Search Result 247, Processing Time 0.029 seconds

A Secure Attribute-based Authentication Scheme for Cloud Computing (클라우드 컴퓨팅을 위한 안전한 속성기반 인증 기법)

  • Moon, Jongho;Choi, Younsung;Won, Dongho
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.345-350
    • /
    • 2016
  • Cloud computing services have different characteristics from the traditional computing environment such as resource sharing, virtualization, etc. These characteristics of cloud computing environment necessitate specific properties such as user identify, access control, security control property, etc. Recently, Yoo proposed an attribute-based authentication scheme for secure cloud computing. However, Yoo's authentication scheme is vulnerable to customer attack and an adversary can modify the authentication request message. In this paper, we propose a secure and efficient attribute-based authentication scheme for cloud computing based on Yoo's scheme.

Web Service Connection Management Scheme for Seamless Migration of User Workspace in Cloud Computing (클라우드 컴퓨팅에서 사용자 작업환경의 끊김 없는 연계를 위한 웹 서비스 연결 관리 기법)

  • Choi, Min
    • Journal of Information Technology Services
    • /
    • v.8 no.1
    • /
    • pp.193-202
    • /
    • 2009
  • Cloud computing emerges as a new computing paradigm which targets reliable and customizable services. The term builds on decades of research in virtual machine, distributed and parallel computing, utility computing, and more recently networking, web service, and software as a service. In this paper, we provide a seamless connection migration of web services. This is useful for cloud computing environment in which many client terminals have mobility. With the wireless internet facility, those mobile users can move place to place during internet communication. Therefore, we provide solutions to the two major problems in current virtualization based migration: communication failure problems and connection re-establishment. Communication channel flushing by zero window notification helps to resolve the communication failure problems and TCP port inheritance prevents connection re-establishment errors during socket reconstruction. Thus, our web service migration facility is now able to preserve open network connections, and even for server sockets. This is a highly transparent approach, in that we did not Introduce additional messages for channel flushing and did not make any modification to the TCP protocol stack. Experimental results show that the overhead due to connection migration of web services is almost negligible when compared with time to take the conventional web service migration.

Research on Technology Production in Chinese Virtual Character Industry

  • Pan, Yang;Kim, KiHong;Yan, JiHui
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.64-79
    • /
    • 2022
  • The concept of Virtual Character has been developed for a long time with people's demand for cultural and entertainment products such as games, animations, and movies. In recent years, with the rapid development of concepts and industries such as social media, self-media, web3.0, artificial intelligence, virtual reality, and Metaverse, Virtual Character has also expanded new derivative concepts such as Virtual Idol, Virtual YouTuber, and Virtual Digital Human. With the development of technology, people's life is gradually moving towards digitalization and virtualization. At the same time, under the global environment of the new crown epidemic, human social activities are rapidly developing in the direction of network society and online society. From the perspective of digital media content, this paper studies the production technology of Virtual Character related products in the Chinese market, and analyzes the future development direction and possibility of the Virtual Character industry in combination with new media development directions and technical production methods. Consider and provide reference for the development of combined applications of digital media content industry, Virtual Character and Metaverse industry.

Organic Form Generation Reflecting a Biomimetic Approach in Contemporary Fashion (생체모방 접근법을 반영한 현대 패션의 유기적 형태 생성)

  • Ro, Juhyun
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.46 no.5
    • /
    • pp.927-943
    • /
    • 2022
  • This study explores the organic form generation method, which reflects the evolving biomimetic approaches converging in fashion technology and considers the characteristics of the organic relationship between the body and the clothing to be represented in contemporary fashion. A literature review on biomimetic architecture and design-related theory and a case study on biomimetic fashion were both conducted. Images, articles, and data related to biomimicry fashion and clothing, including the increase in virtual fashion cases around 2020, were analyzed based on the literature review. Biomimicry was used to derive interdisciplinary similarities in the organic morphogenesis principle, and the result was categorized as a network system, folds and unfolds, pneumatic structures, auxetic growth, and membranes. The biomimetic fashion characteristics, including externalization of the body's interior, expansion of the body structure and silhouette, body protection, independence from the body, and post-human expression through virtualization, were analyzed. Morphogenetic processes performed through biomimetic vision are expected to aid in generating research on the possibility of mass production or popularization in the future through various experimental technical studies.

Research on the Implementation of the Virtual Interface on Multi-mode Mobile Nodes (멀티모드 단말을 위한 가상 인터페이스 구현 연구)

  • Lee, Kyoung-Hee;Lee, Seong-Keun;Rhee, Eun-Jun;Cho, Kyoung-Seob;Lee, Hyun-Woo;Ryu, Won;Hong, Seng-Phil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.677-686
    • /
    • 2010
  • In this paper, we propose the virtual interface management scheme on the multi-mode mobile node for supporting multiple connections to various access networks in fixed mobile convergence (FMC) networks. The proposed scheme supports the virtualization of multiple physical network interfaces by presenting only the virtual interface to beyond IP layers and hiding physical network interfaces from them. In the proposed scheme, only one IP address is allocated to virtual interface without any IP allocations to physical network interfaces. Therefore, the proposed scheme does not change its IP address and keep it during the vertical handover, so that it can support the seamless handover of real-time multimedia services among heterogeneous access networks. The proposed scheme is implemented on the multi-mode mobile node with multiple network interfaces by using NDIS (Network Driver Interface Specifications) libraries. Through the mobility test-bed and the test application of virtual interface, we evaluate and analyze the performance of the proposed scheme.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

Digital Services of Telecom Equipment Suppliers (통신장비제조회사의 디지털 서비스)

  • Kim, Myeong Jun;Batbaatar, Erdenebileg;Kim, Jin Kwang;Ryu, Keun Ho
    • Journal of Digital Contents Society
    • /
    • v.19 no.7
    • /
    • pp.1271-1279
    • /
    • 2018
  • The telecommunication industry, which has traditionally formed its own market area, has also been affected by the after shock of the digitalization triggered by computer communications. In the telecommunications industry, digitalization or digital services refers to network functional virtualization supported by software defined networks. The digitalization of the telecom industry is changing rapidly, and the participants are not limited to the traditional equipment suppliers and service providers in established market, but includes virtually all social entities. To understand this new change, focusing on whether the traditional equipment suppliers that have traditionally played a pivotal role in the center of change will continue its role in this new era of digitalization or not, and how they are progressing toward end-to-end digital services, the goal of digitalization, will lead us to the good understanding of ongoing digitalization.

Price-based Resource Allocation for Virtualized Cognitive Radio Networks

  • Li, Qun;Xu, Ding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4748-4765
    • /
    • 2016
  • We consider a virtualized cognitive radio (CR) network, where multiple virtual network operators (VNOs) who own different virtual cognitive base stations (VCBSs) share the same physical CBS (PCBS) which is owned by an infrastructure provider (InP), sharing the spectrum with the primary user (PU). The uplink scenario is considered where the secondary users (SUs) transmit to the VCBSs. The PU is protected by constraining the interference power from the SUs. Such constraint is applied by the InP through pricing the interference. A Stackelberg game is formulated to jointly maximize the revenue of the InP and the individual utilities of the VNOs, and then the Stackelberg equilibrium is investigated. Specifically, the optimal interference price and channel allocation for the VNOs to maximize the revenue of the InP and the optimal power allocation for the SUs to maximize the individual utilities of the VNOs are derived. In addition, a low‐complexity ±‐optimal solution is also proposed for obtaining the interference price and channel allocation for the VNOs. Simulations are provided to verify the proposed strategies. It is shown that the proposed strategies are effective in resource allocation and the ±‐optimal strategy achieves practically the same performance as the optimal strategy can achieve. It is also shown that the InP will not benefit from a large interference power limit, and selecting VNOs with higher unit rate utility gain to share the resources of the InP is beneficial to both the InP and the VNOs.

Proactive Virtual Network Function Live Migration using Machine Learning (머신러닝을 이용한 선제적 VNF Live Migration)

  • Jeong, Seyeon;Yoo, Jae-Hyoung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.24 no.1
    • /
    • pp.1-12
    • /
    • 2021
  • VM (Virtual Machine) live migration is a server virtualization technique for deploying a running VM to another server node while minimizing downtime of a service the VM provides. Currently, in cloud data centers, VM live migration is widely used to apply load balancing on CPU workload and network traffic, to reduce electricity consumption by consolidating active VMs into specific location groups of servers, and to provide uninterrupted service during the maintenance of hardware and software update on servers. It is critical to use VMlive migration as a prevention or mitigation measure for possible failure when its indications are detected or predicted. In this paper, we propose two VNF live migration methods; one for predictive load balancing and the other for a proactive measure in failure. Both need machine learning models that learn periodic monitoring data of resource usage and logs from servers and VMs/VNFs. We apply the second method to a vEPC (Virtual Evolved Pakcet Core) failure scenario to provide a detailed case study.

Autoscaling Mechanism based on Execution-times for VNFM in NFV Platforms (NFV 플랫폼에서 VNFM의 실행 시간에 기반한 자동 자원 조정 메커니즘)

  • Mehmood, Asif;Diaz Rivera, Javier;Khan, Talha Ahmed;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • The process to determine the required number of resources depends on the factors being considered. Autoscaling is one such mechanism that uses a wide range of factors to decide and is a critical process in NFV. As the networks are being shifted onto the cloud after the invention of SDN, we require better resource managers in the future. To solve this problem, we propose a solution that allows the VNFMs to autoscale the system resources depending on the factors such as overhead of hyperthreading, number of requests, execution-times for the virtual network functions. It is a known fact that the hyperthreaded virtual-cores are not fully capable of performing like the physical cores. Also, as there are different types of core having different frequencies so the process to calculate the number of cores needs to be measured accurately and precisely. The platform independency is achieved by proposing another solution in the form of a monitoring microservice, which communicates through APIs. Hence, by the use of our autoscaling application and a monitoring microservice, we enhance the resource provisioning process to meet the criteria of future networks.